Jiejun Kong
According to our database1,
Jiejun Kong
authored at least 34 papers
between 2001 and 2015.
Collaborative distances:
Collaborative distances:
Timeline
2002
2004
2006
2008
2010
2012
2014
0
1
2
3
4
5
6
7
8
1
1
1
1
1
2
2
3
1
1
1
1
1
2
4
4
4
2
1
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2015
Wirel. Commun. Mob. Comput., 2015
2012
RVIP: bridging live networks and software virtual networks for large scale network simulation at real time.
Proceedings of the 15th ACM International Conference on Modeling, 2012
2011
Towards a Probabilistic Complexity-theoretic Modeling of Biological Cyanide Poisoning as Service Attack in Self-organizing Networks.
IACR Cryptol. ePrint Arch., 2011
2010
Int. J. Auton. Adapt. Commun. Syst., 2010
2009
IEEE Trans. Veh. Technol., 2009
2008
Int. J. Secur. Networks, 2008
CORA: Collaborative Opportunistic Recovery Algorithm for loss controlled, delay bounded ad hoc multicast.
Comput. Commun., 2008
A Randomized Complexity-theoretic Model of Bio-inspired Mobile Epidemics via Close Contact.
Proceedings of the 2008 International Conference on Information Theory and Statistical Learning, 2008
2007
An Identity-Free and On-Demand Routing Scheme against Anonymity Threats in Mobile Ad Hoc Networks.
IEEE Trans. Mob. Comput., 2007
Time-critical underwater sensor diffusion with no proactive exchanges and negligible reactive floods.
Ad Hoc Networks, 2007
A Mobile Delay-Tolerant Approach to Long-Term Energy-Efficient Underwater Sensor Networking.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2007
Complexity-theoretic Modeling of Biological Cyanide Poisoning as Security Attack in Self-organizing Networks.
Proceedings of the 7th IEEE International Conference on Bioinformatics and Bioengineering, 2007
2006
Wirel. Commun. Mob. Comput., 2006
The challenges of building mobile underwater wireless networks for aquatic applications.
IEEE Netw., 2006
GVG-RP: A Net-centric Negligibility-based Security Model for Self-organizing Networks.
IACR Cryptol. ePrint Arch., 2006
Proceedings of the 2006 ACM Workshop on Wireless Security, 2006
Proceedings of the IEEE Wireless Communications and Networking Conference, 2006
Proceedings of the IEEE Wireless Communications and Networking Conference, 2006
An Enhanced Digital Content Mediator (DCM) Approach to Implementing Legitimate and Secure P2P Online Transactions.
Proceedings of IEEE International Conference on Communications, 2006
2005
IACR Cryptol. ePrint Arch., 2005
Low-cost attacks against packet delivery, localization and time synchronization services in under-water sensor networks.
Proceedings of the 2005 ACM Workshop on Wireless Security, 2005
Mobile traffic sensor network versus motion-MIX: tracing and protecting mobile wireless nodes.
Proceedings of the 3rd ACM Workshop on Security of ad hoc and Sensor Networks, 2005
Proceedings of the 6th ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, 2005
Proceedings of the 10th IEEE Symposium on Computers and Communications (ISCC 2005), 2005
2004
IEEE/ACM Trans. Netw., 2004
2003
ESCORT: a decentralized and localized access control system for mobile wireless access to secured domains.
Proceedings of the 2003 ACM Workshop on Wireless Security, 2003
ANODR: anonymous on demand routing with untraceable routes for mobile ad-hoc networks.
Proceedings of the 4th ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, 2003
Proceedings of the 19th International Conference on Data Engineering, 2003
Proceedings of IEEE International Conference on Communications, 2003
2002
Proceedings of the Seventh IEEE Symposium on Computers and Communications (ISCC 2002), 2002
Proceedings of the IEEE International Conference on Communications, 2002
2001
Proceedings of the 9th International Conference on Network Protocols (ICNP 2001), 2001